Papers

Search results

    ConferenceTitleAuthor(s)
    SOUPS 2019"I was told to buy a software or lose my computer. I ignored it": A study of ransomwareCamelia Simoiu, Joseph Bonneau, Christopher Gates, Sharad Goel
    SOUPS 2019Keepers of the Machines: Examining How System Administrators Manage Software Updates For Multiple MachinesFrank Li, Lisa Rogers, Arunesh Mathur, Nathan Malkin, Marshini Chetty
    SOUPS 2019Privacy and Security Threat Models and Mitigation Strategies of Older AdultsAlisa Frik, Leysan Nurgalieva, Julia Bernd, Joyce Lee, Florian Schaub, Serge Egelman
    SOUPS 2018Ethics Emerging: the Story of Privacy and Security Perceptions in Virtual RealityDevon Adams, Alseny Bah, Catherine Barwulor, Nureli Musaby, Kadeem Pitkin, Elissa M. Redmiles
    SOUPS 2018"You don't want to be the next meme": College Students' Workarounds to Manage Privacy in the Era of Pervasive PhotographyYasmeen Rashidi, Tousif Ahmed, Felicia Patel, Emily Fath, Apu Kapadia, Christena Nippert-Eng, Norman Makoto Su
    SOUPS 2018Informal Support Networks: an investigation into Home Data Security PracticesNorbert Nthala, Ivan Flechais
    SOUPS 2018Security in the Software Development LifecycleHala Assal, Sonia Chiasson
    SOUPS 2018Share and Share Alike? An Exploration of Secure Behaviors in Romantic RelationshipsCheul Young Park, Cori Faklaris, Siyan Zhao, Alex Sciuto, Laura Dabbish, Jason Hong
    SOUPS 2018Can Digital Face-Morphs Influence Attitudes and Online Behaviors?Sonam Samat, Eyal Peer, Alessandro Acquisti
    SOUPS 2018"We make it a big deal in the company": Security Mindsets in Organizations that Develop Cryptographic ProductsJulie M. Haney, Mary Theofanos, Yasemin Acar, Sandra Spickard Prettyman
    SOUPS 2018Characterizing the Use of Browser-Based Blocking Extensions To Prevent Online TrackingArunesh Mathur, Jessica Vitak, Arvind Narayanan, Marshini Chetty
    SOUPS 2018User Behaviors and Attitudes Under Password Expiration PoliciesHana Habib, Pardis Emami Naeini, Summer Devlin, Maggie Oates, Chelse Swoopes, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor
    SOUPS 2018Deception Task Design in Developer Password Studies: Exploring a Student SampleAlena Naiakshina, Anastasia Danilova, Christian Tiefenau, Matthew Smith
    SOUPS 2018"It's Scary…It's Confusing…It's Dull": How Cybersecurity Advocates Overcome Negative Perceptions of SecurityJulie M. Haney, Wayne G. Lutters
    SOUPS 2018Online Privacy and Aging of Digital ArtifactsReham Ebada Mohamed, Sonia Chiasson
    SOUPS 2018"If I press delete, it's gone" - User Understanding of Online Data Deletion and ExpirationAmbar Murillo, Andreas Kramm, Sebastian Schnorf, Alexander De Luca
    SOUPS 2018Data Breaches: User Comprehension, Expectations, and Concerns with Handling Exposed DataSowmya Karunakaran, Kurt Thomas, Elie Bursztein, Oxana Comanescu
    SOUPS 2018Away From Prying Eyes: Analyzing Usage and Understanding of Private BrowsingHana Habib, Jessica Colnago, Vidya Gopalakrishnan, Sarah Pearman, Jeremy Thomas, Alessandro Acquisti, Nicolas Christin, Lorrie Faith Cranor
    SOUPS 2018Introducing the Cybersurvival Task: Assessing and Addressing Staff Beliefs about Effective Cyber ProtectionJames Nicholson, Lynne Coventry, Pam Briggs
    SOUPS 2018A Comparative Usability Study of Key Management in Secure EmailScott Ruoti, Jeff Andersen, Tyler Monson, Daniel Zappala, Kent Seamons
    SOUPS 2018API Blindspots: Why Experienced Developers Write Vulnerable CodeDaniela Seabra Oliveira, Tian Lin, Muhammad Sajidur Rahman, Rad Akefirad, Donovan Ellis, Eliany Perez, Rahul Bobhate, Lois A. DeLong, Justin Cappos, Yuriy Brun
    SOUPS 2018Replication Study: A Cross-Country Field Observation Study of Real World PIN Usage at ATMs and in Various Electronic Payment ScenariosMelanie Volkamer, Andreas Gutmann, Karen Renaud, Paul Gerber, Peter Mayer
    SOUPS 2018"Privacy is not for me, it's for those rich women": Performative Privacy Practices on Mobile Phones by Women in South AsiaNithya Sambasivan, Garen Checkley, Amna Batool, Nova Ahmed, David Nemer, Laura Sanely Gaytán-Lugo, Tara Matthews, Sunny Consolvo, Elizabeth Churchill
    SOUPS 2018When is a Tree Really a Truck? Exploring Mental Models of EncryptionJustin Wu, Daniel Zappala
    SOUPS 2018The Effectiveness of Fear Appeals in Increasing Smartphone Locking Behavior among Saudi ArabiansElham Al Qahtani, Mohamed Shehab, Abrar Aljohani

Pages